The US "war on the internet"

Liz Burbank, the burbank digest

November 29, 2009

The US "war on the internet" information below is just the tip of a terrible iceberg, rarely even mentioned, much less examined by US mainstream media. It is chillingly self-explanatory. In the works for years, it is being incrementally implemented (for ex., at the most basic sender-receiver authentication level, as 'anti-spam'. 'anti-ID theft' and other personal 'security' measures.) Total surveillance and control of information and communications is central and essential to the phony 'war on terror' --- a state terror war for global domination as so much of the world
on the deadly receiving end knows. Made clear 'in their own words', even blogging and 'social networking' are intolerable threats to those in the business of spreading fear, lies and tyranny.

"The internet needs to be dealt with as if it were an enemy 'weapons system'..."
Information Operation Roadmap Part 3: "We Must Fight the Net"

A NET OF CONTROL
Unthinkable: How the Internet could become a tool of corporate and government power, based on updates now in the works
Newsweek International Issues 2004
By Steven Levy
Picture, if you will, an information infrastructure that encourages censorship, surveillance and suppression of the creative impulse. Where anonymity is outlawed and every penny spent is accounted for. Where the powers that be can smother subversive (or economically competitive) ideas in the cradle, and no one can publish even a laundry list without the imprimatur of Big Brother. Some prognosticators are saying that such a construct is nearly inevitable. And this infrastructure is none other than the former paradise of rebels and free-speechers: the Internet. ... wasn’t the Internet supposed to be the defining example of empowering technology? Freedom was allegedly built into the very bones of the Internet, designed to withstand nuclear blasts and dictatorial attempts at control. ...
Certainly John Walker (ed: his important article below) believed all that. The hackerish founder of the software firm Autodesk..in the past couple of years noticed a disturbing trend... Walker posted his fears in a web document called The Dangers of Digital Imprimatur http://www.fourmilab.ch/documents/digital-imprimatur/ ...(below)
A concurrent step would be the adoption of "trusted computing," a system by which not only people but computer programs would be stamped with identifying marks. Those would link with certificates that determine whether programs are uncorrupted and cleared to run on your computer. The best-known implementation of this scheme is the work in progress at Microsoft known as Next Generation Secure Computing Base (formerly called Palladium)...

Walker isn’t the first to warn of this ominous power shift. The Internet’s pre-eminent dean of darkness is Lawrence Lessig, the Stanford University guru of cyberlaw. Beginning with his 1999 book "Code and Other Laws of Cyberspace," Lessig has been predicting that corporate and regulatory pressures would usurp the open nature of the Net, and now says that he has little reason to retract his pessimism. Lessig understands that restrictive copyright and Homeland Security laws give a legal rationale to "total control," and also knows that it will be sold to the people as a great way to stop thieves, pirates, malicious hackers, spammers and child pornographers. "To say we need total freedom isn’t going to win," Lessig says.[...]

US Plans to 'Fight the Net' Revealed
by Adam Brookeshttp://news.bbc.co.uk/2/hi/americas/4655196.stm
January 27, 2006 BBC
Pentagon's 2003 "Information Operations Roadmap" newly declassified, gives a glimpse into the US military's plans for "information operations" [...]

Pentagon Plans New Arm to Wage Cyberspace Warshttp://www.nytimes.com/2009/05/29/us/politics/29cyber.html?_r=1&th&emc=th
WASHINGTON — The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare.The military command would complement a civilian effort to be announced by President Obama on Friday that would overhaul the way the United States safeguards its computer networks... Officials said that in addition to the unclassified strategy paper to be released by Mr. Obama on Friday, a classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today...

Obama Asks Bloggers For Help
21 July 2009
President Barack Obama yesterday called on like-minded bloggers to help his administration keep the heat on lawmakers to pass health care reform.
"I know the blogs are best at debunking myths that can slip through a lot of the traditional media outlets," he said. "And that is why you are going to play such an important role in our success in the weeks to come." http://martininthemargins.blogspot.com/2009/07/obama-asks-bloggers-for-help.html

(NB: Bill passed and Obama since has declared a "swine flu" national emergency)
8/28/9 Bill Would Give President Emergency Control of Internethttp://news.cnet.com/8301-13578_3-10320096-38.html
by Declan McCullagh
Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector computers from the Internet. They're not much happier about a revised version that aides to Sen. Jay Rockefeller, West Virginia Democrat, have spent months drafting behind closed doors. CNET News has obtained a copy of the 55-page draft of S.773 (excerpt <http://www.politechbot.com/docs/rockefeller.revised.cybersecurity.draft.082709.pdf> )...The new version would allow the president to "declare a cybersecurity emergency" relating to "non-governmental" computer networks and do what's necessary to respond to the threat. ("Cyber" is defined as anything having to do with the Internet, telecommunications, computers, or computer networks.) ...

U.S. Institute of Peace Study by Israeli Professor: Terrorist Groups Active on the Internethttp://www.dailytimes.com.pk/default.asp?page=story_14-4-2004_pg7_53
There are hundreds of sites on the Internet serving terrorist groups and their supporters, according to a study done by the * US Institute of Peace (USIP). The study undertaken by Gabriel Weimann, a professor at the Haifa University in Israel and currently a senior fellow at USIP, writes that today all active terrorist groups have established their presence on the Internet…..

Israeli high-tech companies work for U.S.U.S. law enforcement wiretaps authorized by the Communications Assistance for Law Enforcement Act (CALEA)http://archive.newsmax.com/archives/articles/2001/12/18/224826.shtml
[Isreali] Amdocs provides billing and directory assistance for most American phone companies, Comverse Infosys handles telephone tapping equipment for US law enforcement, Odigo runs "Instant Message" systems on computers. All three are closely tied to the Mossad and the Israeli Defense Force, which is massively funded by u.s. Most firewalls on US corporate and government computer systems are provided by Israeli Checkpoint Systems. Odigo's offices near the World Trade Towers allegedly received two hour advance warning of the 911attacks...

"From the depth of our heart -- thanks to The Israeli Defense Forces"
Microsoft logo under the text with the Israeli national flag in the background.

Microsoft CEO: Our company almost as Israeli as American
By Maayan Cohen, TheMarker Correspondent, and Reutershttp://www.haaretz.com/hasen/spages/985800.html
Microsoft's Chief Executive Steve Ballmer, on a visit to Israel... at the inauguration ceremony of the American software giant's new research and development center in Herzliya...said Microsoft is an Israeli company almost as much as it is American...that the proportion of Microsoft employees per capita in Israel is almost similar to that in the United States...he knows very few places around the world that offer such a variety of startup opportunities, and that his company intends to purchase more Israeli startup companies... the CEO said Microsoft is not looking to buy all of Yahoo! but is currently engaging in negotiations about other types of deals with the U.S. No. 2 search engine.
Related:# Microsoft Israel creating new R&D center in Herzliya # Yahoo! President Susan Decker takes interest in Israel # Internet giant Yahoo! to follow rivals Google, Microsoft to Israel

US warrantless wiretapping since 1990s predates 9/11
12/19/07 "The Register"- Secret surveillance operations that enabled the National Security Agency (NSA) to access telecommunications traffic data have been in place since the 1990s.... http://www.informationclearinghouse.info/article18928.htm

The Open Source Center is a component of the Office of the Director of National Intelligence administered by the CIA.
OPEN SOURCE INTELLIGENCE ADVANCES
Naquin addressed the Central Intelligence Retirees' Association October 3, 2007. The text of his remarks is at http://www.fas.org/irp/eprint/naquin.pdf
The DNI Open Source Center, which gathers, translates, analyzes, and distributes unclassified open source intelligence from around the world, is steadily growing in capability and impact, according to Doug Naquin, the Center's Director. The Open Source Center, which replaced the CIA's Foreign Broadcast Information Service, is doing more analysis and outreach than it predecessor and is also exploring new media, said Mr. Naquin in a recent speech. "We're looking now at YouTube, which carries some unique and honest-to-goodness intelligence," he said. "We have groups looking at what they call 'Citizens Media': people taking pictures with their cell phones and posting them on the Internet. Then there's Social Media, phenomena like MySpace and blogs.... A couple years back we identified Iranian blogs as a phenomenon worthy of more attention, about six months ahead of anybody else."...

Does The Government Manipulate Social Media?
The U.S. government long ago announced its intention to "fight the net". As revealed by an official Pentagon report called "Information Operations Roadmap" (ed: see above) ... "Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system".
CENTCOM announced in 2008 a team of employees would be "[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information." The Air Force is now also engaging bloggers....
Finally, under the post-9/11 "homeland security" laws, the government routinely demands full access to ISPs and websites... Do you doubt the military and homeland security apparatus would step in to take control of what it considered an "enemy" message...the government considers any message questioning anything the government does as an enemy message. See this, this, this and this... http://georgewashington2.blogspot.com/2009/01/government-heavily-manipulates-social.html

digest note re: Soft power propaganda: US/NED/Soros NGO 'pro-democracy' partner to 'fight terrorism'U.S. government taps Facebook, Google, MTV to "Fight Terrorism
Global Research, November 28, 2008http://www.globalresearch.ca/index.php?context=va&aid=11198
The US State Department announced plans on Monday to promote online youth groups as a new and powerful way to fight crime, political oppression and terrorism.
Drawing inspiration from a movement against FARC rebels in Colombia, the State Department is joining forces with Facebook, Google, MTV, Howcast and others in New York City next week to get the "ball rolling." It said 17 groups from South Africa, Britain and the Middle East which have an online presence like the "Million Voices Against the FARC" will attend a conference at Columbia University Law School from December 3-5. Observers from seven organizations that do not have an online presence -- such as groups from Iraq and Afghanistan -- will attend. There will also be remote participants from Cuba. They will forge an "Alliance of Youth Movement," said James Glassman, under secretary of state for public diplomacy....

"Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time."Social Repression and Internet Surveillance: H. Res. 1695, 1955 & S.1959
By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave Reichert (R-WA),authored the original bill... H.Res.1695....establishes a National Commission and Center of so-called "Excellence" to censor and crush social concerns... perceived to be "threats" by RAND..."homegrown terrorism," "violent radicalization" and "ideologically based violence"...who have been "violently radicalized" by "extremist belief systems."..."The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens."... RAND spokesman, Brian Jenkins... said to Jane Harman’s Committee: "Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time." ...the precise terminology used by Nazis to justify exterminating Jews. http://www.informationclearinghouse.info/article18998.htm

Uruknet receives daily many hacking attempts. To prevent this, we have 10 websites on 6 servers in different places.
So, if the website is slow or it does not answer, you can recall one of the other web sites: www.uruknet.info www.uruknet.de www.uruknet.biz www.uruknet.org.uk www.uruknet.com www.uruknet.org - www.uruknet.it www.uruknet.eu www.uruknet.net www.uruknet.web.at.it

:: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.
We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.
In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.
For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own
that go beyond 'fair use', you must obtain permission from the copyright owner.
:: We always mention the author and link the original site and page of every article.